Assessing Insider Attacks and Privacy Leakage in Managed IoT Systems for Residential Prosumers
暂无分享,去创建一个
[1] Mohammad Reza Aref,et al. A secure ECC-based privacy preserving data aggregation scheme for smart grids , 2017, Comput. Networks.
[2] Naveen K. Chilamkurti,et al. A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure , 2018, Cluster Computing.
[3] Jing Zhang,et al. EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid , 2017, Sensors.
[4] Anirban Basu,et al. Privacy-friendly secure bidding for smart grid demand-response , 2017, Inf. Sci..
[5] Bo Shen,et al. The role of regulatory reforms, market changes, and technology development to make demand response a viable resource in meeting energy challenges , 2014 .
[6] Carlos Henggeler Antunes,et al. Energy management systems aggregators: A literature survey , 2017 .
[7] David J. Edwards,et al. A review on renewable energy transition in Australia: An updated depiction , 2020 .
[8] Mohamed Amine Ferrag,et al. A systematic review of data protection and privacy preservation schemes for smart grid communications , 2018 .
[9] Sari Sultan,et al. Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey , 2019, Comput. Secur..
[10] Federica Paci,et al. Towards an integrated privacy protection framework for IoT: contextualising regulatory requirements with industry best practices , 2019, Living in the Internet of Things (IoT 2019).
[11] Zita Vale,et al. Reschedule of Distributed Energy Resources by an Aggregator for Market Participation , 2018 .
[12] Jun Zhao,et al. A Comprehensive Survey on Local Differential Privacy toward Data Statistics and Analysis , 2020, Sensors.
[13] Ali Dehghantanha,et al. A survey on internet of things security: Requirements, challenges, and solutions , 2019, Internet Things.
[14] Yang Xiao,et al. Privacy preservation for V2G networks in smart grid: A survey , 2016, Comput. Commun..
[15] Sung Bum Pan,et al. Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis , 2019, Symmetry.
[16] Fazal Noor,et al. An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks , 2021, Comput. Syst. Sci. Eng..
[17] Ali Dehghantanha,et al. Fuzzy pattern tree for edge malware detection and categorization in IoT , 2019, J. Syst. Archit..
[18] S. Fathi,et al. A review on Demand-side tools in electricity market , 2017 .